Skip links
December 2025 Ransomware Statistics & Cyber Threat Report

RSecurity December 2025 Ransomware Statistics & Cyber Threat Report

December 2025 Cyber Threats, Ransomware Statistics & Vulnerability Intelligence

In this month’s edition of RSecurity’s Cybersecurity Insights, we provide a comprehensive breakdown of the most critical cyber threats, ransomware statistics, and cybersecurity incidents that shaped December 2025. Our analysis includes global attack vectors, industry-specific vulnerabilities, APT activity, and strategic cybersecurity risk insights for businesses of all sizes.

Global ransomware attacks, CISA-tracked vulnerabilities, APT campaigns, and cyber risk trends shaping December 2025

Total Ransomware Attacks: 78 publicly disclosed ransomware attacks were recorded in December, contributing to 5,967 ransomware incidents in 2025, reinforcing the scale of today’s global ransomware statistics.

Phishing Campaigns: Over 3.7 billion URL-based phishing attacks, primarily targeting credential theft, making phishing one of the most active cyber threats in 2025.

Data Records Exposed: At least ~70.8 million records were exposed across confirmed December 2025 data breaches, including Coupang (≈34 million), SoundCloud, WIRED subscribers, University of Phoenix, and other incidents contributing to the growing global cyber breach landscape.

Top Affected Industries by Cyber Threats

Most targeted sectors: Manufacturing, healthcare, professional services, government

Primary attack vectors: Phishing, credential theft, unpatched vulnerabilities

Primary motives: Financial extortion, data theft, espionage — a pattern consistent with APT-driven cybercrime and ransomware groups

These figures reflect how cyber threats and ransomware attacks remain heavily concentrated in high-value digital economies.

Top Cybersecurity Incidents – December 2025

DroidLock Android Ransomware - A new Android ransomware strain, DroidLock, spread via fake app sites, granting attackers full remote control, locking screens for ransom, stealing data, and threatening permanent data destruction — a major escalation in mobile ransomware attacks.DroidLock Android Ransomware

React2Shell RCE Exploited at Scale - CISA ordered emergency patching of React2Shell (CVE-2025-55182) after mass exploitation of internet-facing React and Next.js apps, enabling unauthenticated remote code execution — one of December’s most dangerous cybersecurity vulnerabilities.

China-Aligned APT Uses Windows Group Policy - The APT group LongNosedGoblin used Windows Group Policy and trusted cloud platforms (OneDrive, Google Drive, Yandex Disk) to deploy espionage malware, highlighting how advanced persistent threats (APT) abuse trusted infrastructure.

Trust Wallet Chrome Extension Breach, $7M Lost - Malicious code in Trust Wallet Chrome extension v2.68 led to $7 million in stolen crypto via recovery-phrase exfiltration — a major supply-chain cybersecurity breach.

GhostPoster Malware in Firefox Add Ons - 17 Firefox extensions infected with GhostPoster malware were downloaded over 50,000 times, showing how browser extensions are increasingly exploited in cyber attacks.

CISA Flags ASUS Live Update Supply-Chain Exploit - CISA added CVE-2025-59374 (CVSS 9.3) to its Known Exploited Vulnerabilities (KEV) list after attackers used trojanized ASUS updates — a serious supply-chain cyber threat.

Cyber Threat & Vulnerability Trends

Mobile Ransomware Expansion - Android ransomware now focuses on data theft + extortion, not just device locking.
APT Abuse of Trusted Tools - Threat actors are increasingly using cloud platforms and Windows Group Policy to bypass detection.
Vulnerability Exploitation Outpaces Patching - Attackers continue exploiting known vulnerabilities, proving why cybersecurity vulnerability management remains critical.
Threat Actor Monetization Shifts - Lower-visibility, high-frequency crypto theft and ransomware attacks show adversaries adapting, not slowing.
RSecurity Cyber Risk Perspective

For Small Businesses

Small organizations face elevated cybersecurity risk due to limited vulnerability management and patching capacity.

Key Risks
What To Do

For Large Enterprises

Enterprises are targeted by APT groups, ransomware gangs, and supply-chain attackers.

Key Risks
What To Do

FAQs

What are network security solutions?

Network security solutions are technologies and processes designed to protect an organization’s network from unauthorized access, cyberattacks, and data breaches. They include firewalls, intrusion detection and prevention systems, access controls, monitoring tools, and advanced threat protection.

Yes. Modern enterprise network security solutions are scalable and can be tailored to small business environments, providing advanced protection without the complexity or cost of traditional enterprise deployments.

Network security solutions protect against threats such as malware, ransomware, phishing-based intrusions, insider threats, denial-of-service attacks, and exploitation of unpatched vulnerabilities.

Small businesses should start with a risk assessment, deploy essential security controls, train employees on cybersecurity best practices, and perform regular security audits and vulnerability assessments.